Loading...
Please wait a moment
Founded by passionate advocates of learning and innovation, Learni set out to make professional training accessible to everyone, everywhere in the world. Our team works in the largest cities such as Paris, Lyon, Marseille, and internationally, to support talents and organizations in their skills development.
10 spots per session maximum — 8 already taken
Which format do you prefer?
30 free minutes with a training advisor — no commitment.
Loading available slots...
Discover why advanced Excel formulas training is crucial for business professionals in March 2026. Explore key formulas, trends, and top training programs to boost your data skills and career.
Discover essential strategies, trends, and training programs for organizations to excel in data governance by March 2026. Stay compliant and leverage data effectively.
Explore the projected return on investment from no-code training programs for businesses by March 2026, including cost savings, productivity gains, and real-world case studies.
Artificial Intelligence training in Cardiff in May 2026 with Learni. Certified, expert trainers, eligible for employer funding. Free quote.
Don't let this gap widen
Without mastery of Elastic Security threat detection, enterprises overlook 82% of advanced persistent threats, as reported in the Verizon DBIR.
This blind spot wastes SOC analysts 30+ hours weekly on false positives, translating to $200,000+ in annual productivity losses per team of five.
Unaddressed gaps fuel breaches averaging $4.45 million in costs (IBM 2023), invite GDPR fines up to 4% of global revenue, and derail careers amid escalating CISO accountability.
Every month without these skills, risks compound—demanding urgent action to safeguard operations.
The Training Elastic Security - Detecting Threats in the Enterprise training is delivered in-person or remotely (blended-learning, e-learning, virtual classroom, remote in-person). At Learni, a Qualiopi-certified training organization, each program is designed to maximize skills acquisition, regardless of the training mode chosen.
The trainer alternates between demonstrative, interrogative, and active methods (through practical exercises and/or real-world scenarios). This pedagogical approach ensures concrete and directly applicable learning in the workplace.
To ensure the quality of the Training Elastic Security - Detecting Threats in the Enterprise training, Learni provides the following teaching resources:
For in-house training at a location external to Learni, the client ensures and commits to having all necessary teaching materials (IT equipment, internet connection...) for the proper conduct of the training action in accordance with the prerequisites indicated in the communicated training program.
The assessment of skills acquired during the Training Elastic Security - Detecting Threats in the Enterprise training is carried out through:
Learni is committed to the accessibility of its professional training programs. All our training programs are accessible to people with disabilities. Our teams are available to adapt teaching methods to your specific needs. Do not hesitate to contact us for any accommodation request.
Learni training programs are available for inter-company and intra-company settings, both in-person and remote. Registration is possible up to 48 business hours before the start of training. Our programs are eligible for OPCO, Pôle emploi, and FNE-Formation funding. Contact us to discuss your training project and funding possibilities.
Installation of Elastic Stack with Security. Configuration of Elasticsearch and Kibana. Integration of beats for log collection. Creation of basic detection rules. Hands-on practice on concrete intrusion cases. Professional exercises on anomaly detection. Start of the red thread project: enterprise attack simulation. Log analysis with timelines. EQL rules tests. Security index optimization. Setting up basic alerts. Interactive remote exercises. Online pedagogical support. (112 words)
Advanced threat detection rules. Threat hunting with KQL. Creation of custom SIEM dashboards. Enterprise use case management. Incident analysis with Elastic Security. API integration for automations. Exercises on real attacks. Red thread project: full SIEM deployment. Incident response tests. Production performance optimization. SOC best practices. Evaluation by professional scenarios. Project defense. Resources for lasting skills. Continuous hands-on practice. (98 words)
Target audience
SOC Analysts, cybersecurity engineers, IT administrators for SIEM skills development
Prerequisites
Knowledge of Elasticsearch, Linux basics, and security log analysis
Loading...
Please wait a moment





























